Exclude/Bypass MFA for Azure AD joined Devices

MS Techie 2,751 Reputation points
2022-11-11T09:12:42.84+00:00

i have win10 Multisession VM which is Azure AD joined .

We have MFA enabled .

Now whenever any user tries to access https://portal.azure.com or https://portal.office.com , then he has to go through MFA process.

We want to exclude MFA for Azure VM , which are Azure AD joined, so that if a user is logging into portal.office.com from this Azure VM (which is Azure AD joined) , then it should only ask for password and not ask for 2nd level of authentication . It should basically consider the AAD joined Azure VM as first level of authentication and then ask only for password.
How to achieve it ?

2) My Azure VM, which is Azure AD joined is not marked as compliant , in the All Devices section under Azure AD. How do i make my Azure VM compliant ?
259470-image.png

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments
{count} votes

3 answers

Sort by: Most helpful
  1. Azdamus 1 Reputation point
    2022-11-12T08:09:54.983+00:00

    Hi MSTechie,

    We would need to know a bit more information on what type of MFA deployment you have - Is it Per-User MFA or Conditional Access MFA ?

    If you have PerUser MFA - Make sure the account authenticating does not have the policy Enforced requiring MFA at every sign-in.

    If it's Conditional Access MFA, inside your Conditional Access Policy that requests MFA prompt to authenticate the user you can go to conditions and use the "Filter for Devices" options to exclude devices with Trust Type - Azure AD Joined.
    259709-screenshot-2022-11-12-at-100844.png


  2. Azdamus 1 Reputation point
    2022-11-14T15:01:11.333+00:00

    In order for that "Compliant" property to turn green, the Azure VMs you are using must be enrolled into Microsoft Endpoint Manager (Intune) and have a Compliance Policy Assigned to them that evaluates the device and if it meets the criteria, it will return as compliant.
    260069-screenshot-2022-11-14-at-165858.png
    Intune is licensed as a stand-alone Azure service and has it's own licensing design. Details on it here - https://learn.microsoft.com/en-us/mem/intune/fundamentals/deployment-guide-intune-setup

    A 3rd party MDM solution can also be used if it has integration with Azure Active Directory to report the compliance state.


  3. Azdamus 1 Reputation point
    2022-11-16T13:21:08.39+00:00

    Apologies for the confusion, I scrolled by mistake on the "Operator" field and instead of "Equals" I switched to "Not equals". The correct setting there is: "TrustType equals Azure AD Joined" or syntax device.trustType -eq "AzureAD". Then the policy applies only on Azure AD Registered & Hybrid Azure AD Joined devices.

    Now I think I understand better your scenario, when you created the VM, you selected the "Login with Azure AD" checkbox, right ?
    260958-screenshot-2022-11-16-at-151727.png

    If that's the case, disregard the former advice and in the "Cloud apps or actions" section of your policy, exclude "Azure Windows VM Sign-In" app. That's it. Official documentation here.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.